SSH? What it is

SSH also Known as Secure Shell, a secured network protocol used for remote login from one system to another system over a network. Additionally, it provides a cryptographically secured connection for strong authentication. It is a strong alternative to non-encryption based protocols Like Telnet used for remote login and FTP, a file transfer method. Except for Microsoft, SSH is used in most of the operating systems.

Applications of SSH

SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH

SSH uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary. There are several ways to use SSH; one is to use automatically generated public-private key pairs to simply encrypt a network connection and then use password authentication to log on.

Another is to use a manually generated public-private key pair to perform the authentication, allowing users or programs to log in without having to specify a password. In this scenario, anyone can produce a matching pair of different keys (public and private).

The public key is placed on all computers that must allow access to the owner of the matching private key (the owner keeps the private key secret). While authentication is based on the private key, the key itself is never transferred through the network during authentication. Secured Shell only verifies whether the same person offering the public key also owns the matching private key

SSH is typically used to log in to a remote machine and execute commands, but it also supports tunnelling, forwarding TCP ports and X11 connections, it can transfer files using the associated SSH file transfer (SFTP) or secure copy (SCP) protocols. SSH uses the client-server model.

Difference Between SSL and SSH

The other thing to Know is SSL (Secure socket layer), let us simply see the difference between SSH and SSL

SSL

SSH

Abbreviation

Secure Socket Layer

Secure shell

Port

443

22

Application

For Encrypting Communication between Browser and Sever

For Encrypting Communication between two computers

Adopted by

E-commerce, Banking, Social media, Government

Widely used by the networking industry

Authentication

via Public/Private key pair

UserId/password

Public/Private key Pair

Conclusion

In this article we have shown you how SSH is used to transfer data in both Password and Public key authentication, you will be glad to know that tech giant Amazon also uses Public key authentication in AWS and its other services. We also briefly discussed differences between SSL and SSH.

Also Read: 10 Best Linux Distros — Ultimate Distro Guide 2018

The post What is Secure Shell ( SSH ) And How it is Different From SSL appeared first on Agatton.

This post first appeared on
Agatton, please read the originial post:
here